Overview
overview
10Static
static
10Γενικ...19.exe
windows7-x64
10Γενικ...19.exe
windows10-2004-x64
10Covid 19 I...ps.exe
windows7-x64
7Covid 19 I...ps.exe
windows10-2004-x64
10Original.document.exe
windows7-x64
10Original.document.exe
windows10-2004-x64
10COVID-19 W... V.exe
windows7-x64
10COVID-19 W... V.exe
windows10-2004-x64
10Malware-Fe...ae.jar
windows7-x64
1Malware-Fe...ae.jar
windows10-2004-x64
1Malware-Fe...7f.exe
windows7-x64
10Malware-Fe...7f.exe
windows10-2004-x64
10Malware-Fe...a5.exe
windows7-x64
10Malware-Fe...a5.exe
windows10-2004-x64
10Malware-Fe...02.exe
windows7-x64
10Malware-Fe...02.exe
windows10-2004-x64
10Malware-Fe...3a.exe
windows7-x64
7Malware-Fe...3a.exe
windows10-2004-x64
10Malware-Fe...ee.exe
windows7-x64
3Malware-Fe...ee.exe
windows10-2004-x64
3AWARENESS ...df.exe
windows7-x64
10AWARENESS ...df.exe
windows10-2004-x64
10Malware-Fe...987494
ubuntu-24.04-amd64
Malware-Fe...237d18
ubuntu-22.04-amd64
3Malware-Fe...00.dll
windows7-x64
8Malware-Fe...00.dll
windows10-2004-x64
8Malware-Fe...35.dll
windows7-x64
8Malware-Fe...35.dll
windows10-2004-x64
8Malware-Fe...29.dll
windows7-x64
8Malware-Fe...29.dll
windows10-2004-x64
8Malware-Fe...2b86da
ubuntu-18.04-amd64
3Malware-Fe...2b86da
debian-9-armhf
4General
-
Target
master.zip
-
Size
682.3MB
-
Sample
250217-wkxzzs1lfy
-
MD5
ba06cb72b125a0a353b87008d95e86ca
-
SHA1
9b4d7e2f1087ccbe73012c8237b0609f10576806
-
SHA256
ba18ff142bae31457031ca49e772b10792ad3a5bdead90cb2c1d37e2a6c2fd59
-
SHA512
3270783c7b42014ecfa3be771d675cffe75a0ba65cf7d4e0f5e1d61e65a4cee2c6f2e471c0e95ef23799c6a7b2eb7edbca8393d59353f4d6531099dd4def909e
-
SSDEEP
12582912:Bo4WyWq2xPQ3JjlAd9hpopjS5j/5i7Pdst6n8+fLOzV0fPWc+afxK6kKuq:BoJqJ5Bs9hpop25bvTGLeVJc3xgdq
Static task
static1
Behavioral task
behavioral1
Sample
Γενική ειδοποίηση χρονοδιαγράμματος εργασίας στο COVID-19.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Γενική ειδοποίηση χρονοδιαγράμματος εργασίας στο COVID-19.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Covid 19 Immunity Tips.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Covid 19 Immunity Tips.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Original.document.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Original.document.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
COVID-19 WHO RECOMENDED V.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
COVID-19 WHO RECOMENDED V.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/5b0ba8d58a64630cb5fcb80e72520bd2ef6f322003fa2588d4d594620e6685ae.jar
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/5b0ba8d58a64630cb5fcb80e72520bd2ef6f322003fa2588d4d594620e6685ae.jar
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/7b98cd3800dede6537cf78e7b61eeeda71d251dc97c70cb7c2135c6aa310ab7f.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/7b98cd3800dede6537cf78e7b61eeeda71d251dc97c70cb7c2135c6aa310ab7f.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/d150feb631d6e9050b7fb76db57504e6dcc2715fe03e45db095f50d56a9495a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/d150feb631d6e9050b7fb76db57504e6dcc2715fe03e45db095f50d56a9495a5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/da26ba1e13ce4702bd5154789ce1a699ba206c12021d9823380febd795f5b002.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/da26ba1e13ce4702bd5154789ce1a699ba206c12021d9823380febd795f5b002.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/f681c1f8c12956a20c27beb9be1112374fefc7651884d7dd92010b40db1e7bee.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/f681c1f8c12956a20c27beb9be1112374fefc7651884d7dd92010b40db1e7bee.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT_pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT_pdf.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Malware-Feed-master/2020.07.16_CISA-WELLMAIL/0c5ad1e8fe43583e279201cdb1046aea742bae59685e6da24e963a41df987494
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral24
Sample
Malware-Feed-master/2020.07.16_CISA-WELLMAIL/83014ab5b3f63b0253cdab6d715f5988ac9014570fa4ab2b267c7cf9ba237d18
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral25
Sample
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/1d973d05dee26f74ae352325da741928af4327f7a6be27cdec085a31fbea8100.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/1d973d05dee26f74ae352325da741928af4327f7a6be27cdec085a31fbea8100.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/37aa87d3408dc3e211d63a3bb38c726787c47c06a19e77f6a14861a91c2dcb35.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/37aa87d3408dc3e211d63a3bb38c726787c47c06a19e77f6a14861a91c2dcb35.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/a1aa0684813cfe9d7ed5c491c8ab132e5583b4fd02187fdae8aa4d934d933f29.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/a1aa0684813cfe9d7ed5c491c8ab132e5583b4fd02187fdae8aa4d934d933f29.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Malware-Feed-master/2020.07.27_CISA-Legacy_Malware_Targeting_QNAP_NAS/09ab3031796bea1b8b79fcfd2b86da
Resource
ubuntu1804-amd64-20240729-en
Malware Config
Extracted
https://webmail.lax.co.il/owa/auth/Current/Script/jquery-3.5.1.min.js
Extracted
revengerat
Guest
voly.ddns.net:88
RV_MUTEX-BUPRawrSNddXxdY
Extracted
spynote
voly.ddns.net:1988
Extracted
sandrorat
voly.ddns.net:1962
Extracted
njrat
Hallaj PRO Rat [Fixed]
HacKed
voly.ddns.net:81
23e6d18d0fa7e25eb8844687c5ca5f5c
-
reg_key
23e6d18d0fa7e25eb8844687c5ca5f5c
-
splitter
boolLove
Extracted
cobaltstrike
0
http://summerevent.webhop.net:443/safebrowsing/rd/tnOztRgLx1ugKt8uumGcreRFm5CqXD9ge-zzz5sA6WzhC
-
access_type
512
-
beacon_type
2048
-
crypto_scheme
256
-
host
summerevent.webhop.net,/safebrowsing/rd/tnOztRgLx1ugKt8uumGcreRFm5CqXD9ge-zzz5sA6WzhC
-
http_header1
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAfQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuNQAAAAoAAAAeQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlAAAABwAAAAAAAAAIAAAAAgAAAAhQUkVGPUlEPQAAAAYAAAAGQ29va2llAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAfQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuNQAAAAoAAAAeQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlAAAABwAAAAAAAAAIAAAAAgAAABJVPXNSdjg1VUhpakJycldpSHoAAAACAAAACFBSRUY9SUQ9AAAABgAAAAZDb29raWUAAAAHAAAAAQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
jitter
3840
-
maxdns
247
-
polling_time
6600
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDmFvK6fWzx+zTnQqAkZAQv6Eqwme1a80cwMNtrYEJShrKKbgpTy71w5Zd9u7EdBClno3HF9U4/9/tkBRw6PPPRa+W6bgpf97I3/Y0z36I5E/h+UP8h076IkzaWyPHbS1QMOiE6AXC3rCERjgirkn1LKUs+Q+zj0LeN8/QHEq/ZqQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/safebrowsing/rd/r8l4jO3947jVxa5wBhEijGc0y77iX4oFy
-
user_agent
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
-
watermark
0
Extracted
jupyter
DR/1.4
http://45.146.165.219
Extracted
jupyter
DR/1.0
http://45.135.232.131
Extracted
Protocol: smtp- Host:
smtps.aruba.it - Port:
587 - Username:
[email protected] - Password:
info1943
Extracted
lokibot
https://academydea.com/alhaji/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
cr*fDaW&m@2y6u
Targets
-
-
Target
Γενική ειδοποίηση χρονοδιαγράμματος εργασίας στο COVID-19.exe
-
Size
762KB
-
MD5
62f9618752fffbd4ff7d52fdc39ec5fb
-
SHA1
0aca420c79a13982f5ec8499a35684276bca4433
-
SHA256
f681c1f8c12956a20c27beb9be1112374fefc7651884d7dd92010b40db1e7bee
-
SHA512
f87598495b6bba85d77c2cfba2904060bd7031ff3e1a40cd44725e6485bd8c20f935fee360a9a5e7962601344bde64ef407d895346ed3f9c6e2148f0d02d06c9
-
SSDEEP
12288:+Qm+VW77777I777oE9K/zepqfxPCddcTvxlK2X+jmnhCMtOnMiJ6pD:HfVW77777I77774zepqfwdmrlujyhZ4k
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
Covid 19 Immunity Tips.exe
-
Size
388KB
-
MD5
76fffeef410bd6b633c09c0f6529891d
-
SHA1
774a51b0b07a7c606672a669fca5939b25b53e66
-
SHA256
e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a
-
SHA512
1fca78852d9ba98ae4ee2ade1694038e6da6fa2d1e29a82e859f6963d6d86b4247da70c7f9780e0ea36f7f7dff178de9c55a450e528c30a073ebbff94423a3d4
-
SSDEEP
12288:HTYFk+FX3k1xJo2X/S2v4WAqhafvUT1Pk9J7y:Hck+RMxJX/S2vOgaf6c
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
-
-
Target
Original.document.exe
-
Size
1.4MB
-
MD5
e7351df51633435293ddc09de7fdc57c
-
SHA1
08e1c2328773a1040194446d0814fc07673526bf
-
SHA256
7b98cd3800dede6537cf78e7b61eeeda71d251dc97c70cb7c2135c6aa310ab7f
-
SHA512
705420ca8ea83df7dc0e2155a00aef5b0d4c32ac4db3e7332d84e7e16bc52ffc4bc5f80ed76790c163aa2a317edd9d86eb16d062352f3c466ca50db10556eabd
-
SSDEEP
24576:Htb20pkaCqT5TBWgNQ7aqia9uDTlos7hTt2WB2W+DZJBSI6A:EVg5tQ7aq7MTqcGWgPn5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
COVID-19 WHO RECOMENDED V.exe
-
Size
378KB
-
MD5
1179a7989031fc4b6331505b388dcb12
-
SHA1
eb644752ffb7d9b12511a0d10448150c91eb30bd
-
SHA256
d150feb631d6e9050b7fb76db57504e6dcc2715fe03e45db095f50d56a9495a5
-
SHA512
c21193698a03259eb486ebfb281e4c8fb7224814fd81d9d676c3ff8f7c9ebb8f277ef03cf5025b648e88849cca8731d16b7735288e49b0bf04da9336b4279b31
-
SSDEEP
6144:0QT73Grj0u1H+DTqKXKqYpwGspOzo5R7dhV0iyIwu5CfQxt/vVauu1fmLA3Kjx4b:rTDu0a+DnHpOAHVtyIV5cQXHUuuU+6Bw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/5b0ba8d58a64630cb5fcb80e72520bd2ef6f322003fa2588d4d594620e6685ae
-
Size
392KB
-
MD5
e8973e617a743a5597b63ce268986761
-
SHA1
a45f057cbf44a70d010ea02e5417e06314b60a0a
-
SHA256
5b0ba8d58a64630cb5fcb80e72520bd2ef6f322003fa2588d4d594620e6685ae
-
SHA512
8d28bfc622ceef532027bf38713c838960e9bb16d1a70b94747340ef44de74055c934f006626d6ee7c40146a84a5ac0616b38f820723e671897294f7647cd3e0
-
SSDEEP
6144:T6ZBcAMRxFPhXOyCHDC2sl10rhXqJ5xb21lDs4+J1sySCTTy5mw3ZZbZ2P:CcAuT5+bHDC2cmhXqJ5xgmGvCTit/oP
Score1/10 -
-
-
Target
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/7b98cd3800dede6537cf78e7b61eeeda71d251dc97c70cb7c2135c6aa310ab7f
-
Size
1.4MB
-
MD5
e7351df51633435293ddc09de7fdc57c
-
SHA1
08e1c2328773a1040194446d0814fc07673526bf
-
SHA256
7b98cd3800dede6537cf78e7b61eeeda71d251dc97c70cb7c2135c6aa310ab7f
-
SHA512
705420ca8ea83df7dc0e2155a00aef5b0d4c32ac4db3e7332d84e7e16bc52ffc4bc5f80ed76790c163aa2a317edd9d86eb16d062352f3c466ca50db10556eabd
-
SSDEEP
24576:Htb20pkaCqT5TBWgNQ7aqia9uDTlos7hTt2WB2W+DZJBSI6A:EVg5tQ7aq7MTqcGWgPn5
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/d150feb631d6e9050b7fb76db57504e6dcc2715fe03e45db095f50d56a9495a5
-
Size
378KB
-
MD5
1179a7989031fc4b6331505b388dcb12
-
SHA1
eb644752ffb7d9b12511a0d10448150c91eb30bd
-
SHA256
d150feb631d6e9050b7fb76db57504e6dcc2715fe03e45db095f50d56a9495a5
-
SHA512
c21193698a03259eb486ebfb281e4c8fb7224814fd81d9d676c3ff8f7c9ebb8f277ef03cf5025b648e88849cca8731d16b7735288e49b0bf04da9336b4279b31
-
SSDEEP
6144:0QT73Grj0u1H+DTqKXKqYpwGspOzo5R7dhV0iyIwu5CfQxt/vVauu1fmLA3Kjx4b:rTDu0a+DnHpOAHVtyIV5cQXHUuuU+6Bw
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/da26ba1e13ce4702bd5154789ce1a699ba206c12021d9823380febd795f5b002
-
Size
1.1MB
-
MD5
9498ba71b33e9e9e19c352579e0d1b0a
-
SHA1
39419cf0c4a2aec86db7e87aaecf2972ed7cddb6
-
SHA256
da26ba1e13ce4702bd5154789ce1a699ba206c12021d9823380febd795f5b002
-
SHA512
780d617fc6fd03bd54bfe8fdad3dea57e558a7b06d03304d77fc2cf7c7dac584bea844c15e3afd6416bb3bd1266c7287864571eb3cacf2aa014b0a5a381561e0
-
SSDEEP
24576:8tb20pkaCqT5TBWgNQ7a369EIqcxl/KXm6A:lVg5tQ7a36F/B5
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a
-
Size
388KB
-
MD5
76fffeef410bd6b633c09c0f6529891d
-
SHA1
774a51b0b07a7c606672a669fca5939b25b53e66
-
SHA256
e4e5c3a6c15beff4e17117075e2c0bd65f176d81e6885134d2b4d97c20d4773a
-
SHA512
1fca78852d9ba98ae4ee2ade1694038e6da6fa2d1e29a82e859f6963d6d86b4247da70c7f9780e0ea36f7f7dff178de9c55a450e528c30a073ebbff94423a3d4
-
SSDEEP
12288:HTYFk+FX3k1xJo2X/S2v4WAqhafvUT1Pk9J7y:Hck+RMxJX/S2vOgaf6c
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
-
-
Target
Malware-Feed-master/2020.06.22_FBI-FLASH-MI-000124-MW/f681c1f8c12956a20c27beb9be1112374fefc7651884d7dd92010b40db1e7bee
-
Size
762KB
-
MD5
62f9618752fffbd4ff7d52fdc39ec5fb
-
SHA1
0aca420c79a13982f5ec8499a35684276bca4433
-
SHA256
f681c1f8c12956a20c27beb9be1112374fefc7651884d7dd92010b40db1e7bee
-
SHA512
f87598495b6bba85d77c2cfba2904060bd7031ff3e1a40cd44725e6485bd8c20f935fee360a9a5e7962601344bde64ef407d895346ed3f9c6e2148f0d02d06c9
-
SSDEEP
12288:+Qm+VW77777I777oE9K/zepqfxPCddcTvxlK2X+jmnhCMtOnMiJ6pD:HfVW77777I77774zepqfwdmrlujyhZ4k
Score3/10 -
-
-
Target
AWARENESS NOTICE ON CORONAVIRUS COVID-19 DOCUMENT_pdf.exe
-
Size
1.1MB
-
MD5
9498ba71b33e9e9e19c352579e0d1b0a
-
SHA1
39419cf0c4a2aec86db7e87aaecf2972ed7cddb6
-
SHA256
da26ba1e13ce4702bd5154789ce1a699ba206c12021d9823380febd795f5b002
-
SHA512
780d617fc6fd03bd54bfe8fdad3dea57e558a7b06d03304d77fc2cf7c7dac584bea844c15e3afd6416bb3bd1266c7287864571eb3cacf2aa014b0a5a381561e0
-
SSDEEP
24576:8tb20pkaCqT5TBWgNQ7a369EIqcxl/KXm6A:lVg5tQ7a36F/B5
-
Lokibot family
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
Malware-Feed-master/2020.07.16_CISA-WELLMAIL/0c5ad1e8fe43583e279201cdb1046aea742bae59685e6da24e963a41df987494
-
Size
6.1MB
-
MD5
01d322dcac438d2bb6bce2bae8d613cb
-
SHA1
8830e9d90c508adf9053e9803c64375bc9b5161a
-
SHA256
0c5ad1e8fe43583e279201cdb1046aea742bae59685e6da24e963a41df987494
-
SHA512
3705b5ceb4ea06370da2a0d73b60e776c9528545704442d0872b75d8593966905eb2ad6a4edddec42bed2115bcd22a37154079c73c26d0a9491a9d349c7e4735
-
SSDEEP
49152:RXKUBXE/J9KhwyXGHjKRwpEcWDm4grE/jwgQbl+8cUiFNj8hqTQqc5Y4lZT3iDS7:ZK34fLjLU0xQq2YRQD
Score1/10 -
-
-
Target
Malware-Feed-master/2020.07.16_CISA-WELLMAIL/83014ab5b3f63b0253cdab6d715f5988ac9014570fa4ab2b267c7cf9ba237d18
-
Size
2.1MB
-
MD5
8777a9796565effa01b03cf1cea9d24d
-
SHA1
53098b025a3f469ebc3e522f7b0999011cafb943
-
SHA256
83014ab5b3f63b0253cdab6d715f5988ac9014570fa4ab2b267c7cf9ba237d18
-
SHA512
e9c2bdcd2b298456726f0fc15ecf3cbfd667a7f0196bd42ecde1058dbfe33aeccb1626a462797cdaf1f32e2515ce08f0fa2d46e34833e0ac098081d9cb89ac41
-
SSDEEP
49152:xtt6IZ6yPcb6MSsGN4aftKLK8Fa0Bpmy8TxQbjtHpbJ4E:xttn7Pc/Sjb5GpmyWxQVJbJ4E
Score3/10 -
-
-
Target
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/1d973d05dee26f74ae352325da741928af4327f7a6be27cdec085a31fbea8100
-
Size
104KB
-
MD5
7a7ef986808ebb7781f5d64da9d7900c
-
SHA1
8e4eeac70526a412b0a8bb253d081b273e2b56dd
-
SHA256
1d973d05dee26f74ae352325da741928af4327f7a6be27cdec085a31fbea8100
-
SHA512
9ed64de5bda92df080fe60672c7f25d99603f2cbb28ac9255af5f207d943c0fabf962c3fb4a965a7b0f50c48c7db6253ae8223b2abf49b5d8941dfe152425c63
-
SSDEEP
1536:0PU6uBpkNfzMnIGXF0Ox1GqCYCgq/M//OcIihssWjcdG+lE/HVpC3:0TwozGXF0sEXQ8ihzG+S/1p
Score8/10-
Server Software Component: Terminal Services DLL
-
-
-
Target
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/37aa87d3408dc3e211d63a3bb38c726787c47c06a19e77f6a14861a91c2dcb35
-
Size
332KB
-
MD5
26e71f1d387298162c1b19e858d001a1
-
SHA1
ecc74b845278696e41220ea1972e31119a5d0869
-
SHA256
37aa87d3408dc3e211d63a3bb38c726787c47c06a19e77f6a14861a91c2dcb35
-
SHA512
6e919b81b51c3d4f755465219213a6194fbebddff84d3a23377bfac2de7fc2468cceffea95d75ec979d9a706bb8d85aa03579f212879a91d581fe75fdb574421
-
SSDEEP
6144:NSGCZ4BejCRVfTwEGVyA8mydNLPwPQmTDIH6ECDR5Rnk/Z:NSGCZ0e+7wEmyAhyQ5b6h
Score8/10-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Drops file in System32 directory
-
-
-
Target
Malware-Feed-master/2020.07.23_FBI-FLASH-AC-000129-TT/a1aa0684813cfe9d7ed5c491c8ab132e5583b4fd02187fdae8aa4d934d933f29
-
Size
123KB
-
MD5
490d17a5b016f3abc14cc57f955b49b3
-
SHA1
a1bb73f6581ab51457eb7160be8ee4fb18916153
-
SHA256
a1aa0684813cfe9d7ed5c491c8ab132e5583b4fd02187fdae8aa4d934d933f29
-
SHA512
a130433a5b2516ced7a14419edbe006c07e9d58a3a416dd9003fb1cb2a0e7c48a93cb7f1fc38f19536413c355ac1d05a78369dcbc6bbe3cfce2e1df3d81480a5
-
SSDEEP
3072:pPwPQ+JTu0xIHjWjEJly2sfpfi+l7+sm+2MRThk:pPwPQmTDIH6ECDR5Rnk
Score8/10-
Server Software Component: Terminal Services DLL
-
-
-
Target
Malware-Feed-master/2020.07.27_CISA-Legacy_Malware_Targeting_QNAP_NAS/09ab3031796bea1b8b79fcfd2b86dac8f38b1f95f0fce6bd2590361f6dcd6764
-
Size
18KB
-
MD5
8cee2a187198648c199c1d135c918a3a
-
SHA1
a9f39f3b832344a79d32d92ac56c50cdaff0b93c
-
SHA256
09ab3031796bea1b8b79fcfd2b86dac8f38b1f95f0fce6bd2590361f6dcd6764
-
SHA512
bb4a8c108c08b4da2ee36f8876c53c2ad28f793cc5ed9999eb81fcead95123adc13d6c718dc3c10e0be75c2b0760251d756a95c61341ff99a84be576d5d00374
-
SSDEEP
384:S0DO7oJgfOzs0KoWI3xMrKPDWsqLb0Tx75nrzoAU1j:L6TOzs0KfoxBBVcJ
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Virtualization/Sandbox Evasion
1System Checks
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1